,

Computer Ethics

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2009
ISBN13: 9780131112414
Rubricering
Pearson Education e druk, 2009 9780131112414
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Computer Ethics: Analyzing Information Technology,

 

The 4th edition brings the field of computer ethics into the 21st Century.  Drawing on concepts and theories from STS, this edition introduces a new approach: sociotechnical computer ethics.  The book maintains a focus on enduring issues of privacy, property, democracy, and professional ethics while coming to grips with current developments in computing, information, communication technologies, and ethical issues around social networking, free and open source software, Wikipedia, artificial agents, and more. 

 

The new edition is accessible to undergraduates while at the same time providing analyses that will be of interest to scholars and theorists. As before, chapters begin with short scenarios that make the issues concrete; explain the issues clearly; provide rigorous and provocative discussion; and conclude with a set of study questions.

 

"Perhaps the greatest strength of this work is that it excels at being both a college course textbook and as a book that advances the basic ideas that comprise the field."

Peter Madsen, Carnegie Melon University

 

"I believe this is the best text on the market for Computer Ethics."

Day Radebaugh, Wichita State University

 

"The author does a good job of setting the setting the stage for a discussion on Computer Ethics and the many important factors surrounding this field."

Demetria Enis-Cole, University of North Texas

Specificaties

ISBN13:9780131112414
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p><strong>Contents</strong></p> <p>Preface vi</p> <p>Acknowledgments viii</p> <p>About the Authors viii</p> <p><strong>Chapter 1 Introduction to Sociotechnical Computer Ethics</strong></p> <p><strong>Chapter Outline 1</strong></p> <p><strong>Scenarios 2</strong></p> <p>1.1 A Virtual Rape 2 • 1.2 Surprises About Social Networking 3 • 1.3 RFID and Caring for the Elderly 4</p> <p><strong>Introduction: Why Computer Ethics? 5</strong></p> <p><strong>The Standard Account 7</strong></p> <p>New Possibilities, a Vacuum of Policies, Conceptual Muddles 7 • An Update to the Standard Account 10</p> <p><strong>The Sociotechnical Systems Perspective 13</strong></p> <p>Reject Technological Determinism/Think Coshaping 13 • Reject Technology as Material Objects/Think Sociotechnical Systems 15 • Reject Technology as Neutral/Think Technology Infused with Value 17</p> <p><strong>Sociotechnical Computer Ethics 18</strong></p> <p><strong>Micro- and Macro-Level Analysis 21</strong></p> <p><strong>Return to the “Why Computer Ethics?” Question 21</strong></p> <p>Conclusion 22 • Study Questions 23</p> <p><strong>Chapter 2 Ethics and Information Technology 24</strong></p> <p><strong>Chapter Outline 24</strong></p> <p><strong>Introduction: “Doing” Ethics 25</strong></p> <p>Descriptive/Normative 26 • The Dialectic Method 28 • Ethics is Relative” 32</p> <p><strong>Ethical Theories and Concepts 35</strong></p> <p>Utilitarianism 35 • Intrinsic and Instrumental Value 36 • Acts versus Rules 38</p> <p>Critique of Utilitarianism 39 • Case Illustration 41 • Deontological Theory 42 • Case Illustration 44 • Rights 46 • Rights and Social Contract Theory 47 • Virtue Ethics 48 • Analogical Reasoning in Computer Ethics 49</p> <p>Conclusion 51 • Study Questions 51</p> <p><strong>Chapter 3 Ethics in IT-Configured Societies 53</strong></p> <p><strong>Chapter Outline 53</strong></p> <p><strong>Scenarios 54</strong></p> <p>3.1 Google in China: “Don’t Be Evil” 54 • 3.2 Turing Doesn’t Need to Know 553.3 Turnitin Dot Com 55</p> <p><strong>Introduction: IT-Configured Societies 55</strong></p> <p><strong>Technology as the Instrumentation of Human Action 56</strong></p> <p>Cyborgs, Robots, and Humans 58</p> <p><strong>Three Features of IT-Configured Activities 60</strong></p> <p>Global, Many-to-Many Scope 61 Distinctive Identity Conditions 62 Reproducibility 65</p> <p><strong>IT-Configured Domains of Life 66</strong></p> <p>Virtuality, Avatars, and Role-Playing Games 66 Friendship and Social Networking 68 Education and Plagiarism Detection 70</p> <p><strong>Democracy and the Internet 72</strong></p> <p>What Is Democracy? 73 The Arguments 74 • Is the Internet a Democratic Technology? 76</p> <p>Conclusion 79 Study Questions 79</p> <p><strong>Chapter 4 Information Flow, Privacy, and Surveillance 81</strong></p> <p><strong>Chapter Outline 81</strong></p> <p><strong>Scenarios 82</strong></p> <p>4.1 Email Privacy and Advertising 82 • 4.2 Workplace Spying: The Lidl Case 82• 4.3 Data Mining and e-Business 83</p> <p><strong>Introduction: Information Flow With and Without Information Technology 84</strong></p> <p><strong>Why Care About Privacy? 86</strong></p> <p>No Need to Worry” 87 • The Importance of Privacy 90 • Privacy as an Individual Good 90 • Privacy as Contextual Integrity 93 Privacy as a Social Good Essential for Democracy 95 Autonomy, Democracy, and the Panoptic Gaze 96 Data Mining, Social Sorting, and Discrimination 98 Crude Categories 100 •Summary of the Arguments for Privacy and Against Surveillance 101</p> <p><strong>Is Privacy Over? Strategies for Shaping Personal Information Flow 101</strong></p> <p>Fair Information Practices 102 Transparency 104 Opt-In versus Opt-Out 104 •Design and Computer Professionals 105 •Personal Steps for All IT Users 106 •A Note on Privacy and Globalization 107</p> <p>Conclusion 107 Study Questions 108</p> <p><strong>Chapter 5 Digital Intellectual Property 109</strong></p> <p><strong>Chapter Outline 109</strong></p> <p><strong>Scenarios 110</strong></p> <p>5.1 Obtaining Pirated Software Abroad 110 • 5.2 Free Software that Follows Proprietary Software 110 • 5.3 Using Public Domain Software in Proprietary Software 111</p> <p><strong>Introduction: The Complexities of Digital Property 111</strong></p> <p>Definitions 112 Setting the Stage 113</p> <p><strong>Protecting Property Rights in Software 114</strong></p> <p>Copyright 114 Trade Secrecy 118 Patent Protection 119</p> <p><strong>Free and Open Source Software 122</strong></p> <p><strong>The Philosophical Basis of Property 124</strong></p> <p>Natural Rights Arguments 124 Critique of the Natural Rights Argument 125• A Natural Rights Argument Against Software Ownership 127</p> <p><strong>PS Versus FOSS 128</strong></p> <p><strong>Is it Wrong to Copy Proprietary Software? 129</strong></p> <p><strong>Breaking Rules, No Rules, and New Rules 133</strong></p> <p>Conclusion 135 • Study Questions 136</p> <p><strong>Chapter 6 Digital Order 137</strong></p> <p><strong>Chapter Outline 137</strong></p> <p><strong>Scenarios 137</strong></p> <p>6.1 Bot Roast 137 • 6.2Wiki Warfare 138 • 6.3Yahoo and Nazi Memorabilia 139</p> <p><strong>Introduction: Law and Order on the Internet 140</strong></p> <p><strong>Sociotechnical Order 142</strong></p> <p><strong>Online Crime 143</strong></p> <p><strong>Hackers and the Hacker Ethic 145</strong></p> <p><strong>Sociotechnical Security 150</strong></p> <p>Who Is to Blame in Security Breaches? 152 Trade-Offs in Security 153</p> <p><strong>Wikipedia: A New Order of Knowledge Production 154</strong></p> <p><strong>Freedom of Expression and Censorship 156</strong></p> <p>John Stuart Mill and Freedom of Expression 157</p> <p>Conclusion 160 • Study Questions 161</p> <p><strong>Chapter 7 Professional Ethics in Computing 162</strong></p> <p><strong>Chapter Outline 162</strong></p> <p><strong>Scenarios 163</strong></p> <p>7.1 Software Safety 163 • 7.2 Security in a Custom Database 164• 7.3 Conflict of Interest 164</p> <p><strong>Introduction: Why Professional Ethics? 165</strong></p> <p>Therac-25 and Malfunction 54 165</p> <p><strong>The Paradigm of Professions 167</strong></p> <p><strong>Characteristics of Professions 168</strong></p> <p><strong>Sorting Out Computing and its Status as a Profession 171</strong></p> <p>Mastery of Knowledge 171 Formal Organization 172 Autonomy 173 Codes of Ethics 174 The Culture of Computing 175</p> <p><strong>Software Engineering 176</strong></p> <p><strong>Professional Relationships 178</strong></p> <p>Employer—Employee 178 Client—Professional 180 Other Stakeholders—Professional 182 Professional—Professional 183 Conflicting Responsibilities 184</p> <p><strong>A Legal Perspective on Professionalism in Computing 185</strong></p> <p>Licensing 185 Selling Software 186 Selling—Buying and the Categorical Imperative 187 Torts 188 Negligence 188</p> <p><strong>A Final Look at the State of the Profession 190</strong></p> <p>Guns-for-Hire or Professionals 190 Efficacy, Public Trust, and the Social Contract 191</p> <p>Conclusion 192 • Study Questions 193</p> <p>Websites 195</p> <p>References 196</p> <p>Index 198</p>

Rubrieken

    Personen

      Trefwoorden

        Computer Ethics